scholarly journals A walkthrough of Amazon Elastic Compute Cloud (Amazon EC2): A Review

Author(s):  
Anurag Choudhary

Abstract: Cloud services are being provided by various giant corporations notably Amazon Web Services, Microsoft Azure, Google Cloud Platform, and others. In this scenario, we address the most prominent web service provider, which is Amazon Web Services, which comprises the Elastic Compute Cloud functionality. Amazon offers a comprehensive package of computing solutions to let businesses establish dedicated virtual clouds while maintaining complete configuration control over their working environment. An organization needs to interact with several other technologies; however, instead of installing the technologies, the company may just buy the technology available online as a service. Amazon's Elastic Compute Cloud Web service, delivers highly customizable computing capacity throughout the cloud, allowing developers to establish applications with high scalability. Explicitly put, an Elastic Compute Cloud is a virtual platform that replicates a physical server on which you may host your applications. Instead of acquiring your own hardware and connecting it to a network, Amazon provides you with almost endless virtual machines to deploy your applications while they control the hardware. This review will focus on the quick overview of the Amazon Web Services Elastic Compute Cloud which also containing the features, pricing, and challenges. Finally, unanswered obstacles, and future research directions in Amazon Web Services Elastic Compute Cloud, are addressed. Keywords: Cloud Computing, Cloud Service Provider, Amazon Web Services, Amazon Elastic Compute Cloud, AWS EC2

2014 ◽  
Vol 543-547 ◽  
pp. 2933-2936
Author(s):  
Jun Rong Li ◽  
Wen Bo Zhou ◽  
Li Wen Mu ◽  
Tong Yu Yin ◽  
Yuan Li Feng

Different cloud services need different resources, how to use the resources efficiently has become one of the hot research topics about cloud computing. In order to improve the utilization of resources in cloud, this paper proposes an automatic cloud service classification method, which uses an artificial neural network to predict the type of service resource requirements, and classifies services based on the predicting result. In this paper, we do classification experiments on three groups of Web services on Web service site. The experiment results show that, the method is effective and can predict the type of resource requirements for Web services automatically.


2018 ◽  
Vol 6 (5) ◽  
pp. 340-345
Author(s):  
Rajat Pugaliya ◽  
Madhu B R

Cloud Computing is an emerging field in the IT industry. Cloud computing provides computing services over the Internet. Cloud Computing demand increasing drastically, which has enforced cloud service provider to ensure proper resource utilization with less cost and less energy consumption. In recent time various consolidation problems found in cloud computing like the task, VM, and server consolidation. These consolidation problems become challenging for resource utilization in cloud computing. We found in the literature review that there is a high level of coupling in resource utilization, cost, and energy consumption. The main challenge for cloud service provider is to maximize the resource utilization, reduce the cost and minimize the energy consumption. The dynamic task consolidation of virtual machines can be a way to solve the problem. This paper presents the comparative study of various task consolidation algorithms.


Cloud service provider in cloud environment will provide or provision resource based on demand from the user. The cloud service provider (CSP) will provide resources as and when required or demanded by the user for execution of the job on the cloud environment. The CSP will perform this in a static and dynamic manner. The CSP should also consider various other factors in order to provide the resources to the user, the prime among that will be the Service Level Agreement (SLA), which is normally signed by the user and cloud service provider during the inception phase of service. There are many algorithm which are used in order to allocate resources to the user in cloud environment. The algorithm which is proposed will be used to reduce the amount of energy utilized in performing various job execution in cloud environment. Here the energy utilized for execution of various jobs are taken into account by increasing the number of virtual machines that are used on a single physical host system. There is no thumb rule to calculate the number of virtual machines to be executed on a single host. The same can be derived by calculating the amount of space, speed required along with the time to execute the job on a virtual machine. Based up on this we can derive the number of Virtual machine on a single host system. There can be 10 virtual machines on a single system or even 20 number of virtual machines on single physical system. But if the same is calculated by the equation then the result will be exactly matching with the threshold capacity of the physical system[1]. If more number of physical systems are used to execute fewer virtual machines on each then the amount of energy consumed will be very high. So in order to reduce the energy consumption , the algorithm can be used will not only will help to calculate the number of virtual machines on single physical system , but also will help to reduce the energy as less number of physical systems will be in need[2].


2021 ◽  
Vol 17 (4) ◽  
pp. 75-88
Author(s):  
Padmaja Kadiri ◽  
Seshadri Ravala

Security threats are unforeseen attacks to the services provided by the cloud service provider. Depending on the type of attack, the cloud service and its associated features will be unavailable. The mitigation time is an integral part of attack recovery. This research paper explores the different parameters that will aid in predicting the mitigation time after an attack on cloud services. Further, the paper presents machine learning models that can predict the mitigation time. The paper presents the kernel-based machine learning models that can predict the average mitigation time during security attacks. The analysis of the results shows that the kernel-based models show 87% accuracy in predicting the mitigation time. Furthermore, the paper explores the performance of the kernel-based machine learning models based on the regression-based predictive models. The regression model is used as a benchmark model to analyze the performance of the machine learning-based predictive models in the prediction of mitigation time in the wake of an attack.


Author(s):  
Dong Dong ◽  
Lizhe Sun ◽  
Zhaohao Sun

This chapter examines Web services in China. More specifically, it examines the state-of-the-art of China's Web services in terms of cloud services, mobile services, and social networking services through exploring several leading Web service providers in the ICT industry, including Alibaba, Tencent, China Mobile, and Huawei. This research reveals that the Chinese culture has played an important role in the success of China's Web services. The trade-off ideology and communication conventions from Chinese traditional culture, as well as Mao Zedong thought, greatly influenced the development of China's Web services. The findings of this chapter might facilitate the research and development of Web services and better understanding of the growth in China's ICT industry, as well as future trends.


Author(s):  
Jagdeep Kaur ◽  
Meghna Sharma

The public cloud Amazon Web Service (AWS) provides a wide range of services like computation, networking, analytics, development and management tools, application services, mobile services, and management of Internet-of-Things (IoT) devices. The Amazon Web Services (AWS) IoT is an excellent IoT cloud platform and is exclusively responsible for connecting devices into various fields like healthcare, biology, municipal setup, smart homes, marketing, industrial, agriculture, education, automotive, etc. This chapter highlights many other initiatives promoted by AWS IoT. The main motive of this chapter is to present how AWS IoT works. The chapter starts with the design principles of AWS IoT services. Further, the authors present a detailed description of the AWS IoT components (e.g., Device SDK, Message Broker, Rule Engine, Security and Identity Service, Thing Registry, Thing Shadow, and Thing Shadow Service). The chapter concludes with a description of various challenges faced by AWS IoT and future research directions.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2010 ◽  
Vol 21 (4) ◽  
pp. 60-90 ◽  
Author(s):  
Konstantinos Stamkopoulos ◽  
Evaggelia Pitoura ◽  
Panos Vassiliadis ◽  
Apostolos Zarras

The appropriate deployment of web service operations at the service provider site plays a critical role in the efficient provision of services to clients. In this paper, the authors assume that a service provider has several servers over which web service operations can be deployed. Given a workflow of web services and the topology of the servers, the most efficient mapping of operations to servers must then be discovered. Efficiency is measured in terms of two cost functions that concern the execution time of the workflow and the fairness of the load distribution among the servers. The authors study different topologies for the workflow structure and the server connectivity and propose a suite of greedy algorithms for each combination.


2011 ◽  
Vol 08 (04) ◽  
pp. 291-302
Author(s):  
RAVI SHANKAR PANDEY

Web services are programs which perform some elementary business process of an application and are distributed over the Internet. These services are described, discovered and executed using standard languages WSDL, SOAP and UDDI. Proliferation of web services has resulted in intense competition between providers, which provide the same service. To survive in such a competitive environment, they need to advertise the quality of their service. Web service description language does not provide support to describe quality attributes. Recently, DAmbrogio proposed QOS model of web services based on a meta model of WSDL. In this paper, we present a platform to advertise QOS as declared by the service provider. This tool generates a WSDL file from Java code along with its quality of service attributes. It accepts Java code and a file containing quality attributes. These attributes include reliability, availability, and operation demand and operation latency. These attributes are included in WSDL file as a content of description element.


2017 ◽  
Author(s):  
◽  
Roshan Lal Neupane

Cloud-hosted services are being increasingly used in online businesses in e.g., retail, healthcare, manufacturing, entertainment due to benefits such as scalability and reliability. These benefits are fueled by innovations in orchestration of cloud platforms that make them totally programmable as Software Defined everything Infrastructures (SDxI). At the same time, sophisticated targeted attacks such as Distributed Denial-of-Service (DDoS) are growing on an unprecedented scale threatening the availability of online businesses. In this thesis, we present a novel defense system called Dolus to mitigate the impact of DDoS attacks launched against high-value services hosted in SDxI-based cloud platforms. Our Dolus system is able to initiate a pretense in a scalable and collaborative manner to deter the attacker based on threat intelligence obtained from attack feature analysis in a two-stage ensemble learning scheme. Using foundations from pretense theory in child play, Dolus takes advantage of elastic capacity provisioning via quarantine virtual machines and SDxI policy co-ordination across multiple network domains. To maintain the pretense of false sense of success after attack identification, Dolus uses two strategies: (i) dummy traffic pressure in a quarantine to mimic target response time profiles that were present before legitimate users were migrated away, and (ii) Scapy-based packet manipulation to generate responses with spoofed IP addresses of the original target before the attack traffic started being quarantined. From the time gained through pretense initiation, Dolus enables cloud service providers to decide on a variety of policies to mitigate the attack impact, without disrupting the cloud services experience for legitimate users. We evaluate the efficacy of Dolus using a GENI Cloud testbed and demonstrate its real-time capabilities to: (a) detect DDoS attacks and redirect attack traffic to quarantine resources to engage the attacker under pretense, and (b) coordinate SDxI policies to possibly block DDoS attacks closer to the attack source(s).


Sign in / Sign up

Export Citation Format

Share Document